jmpews / Dobby

a lightweight, multi-platform, multi-architecture hook framework.
Apache License 2.0
3.98k stars 822 forks source link

seccomp prevented call to disallowed arm64 system call 300 #54

Closed lozn00 closed 5 years ago

lozn00 commented 5 years ago

三星A70 9.0系统 hook fstatat64 出现seccomp prevented call to disallowed arm64 system call 300

A/libc: Fatal signal 31 (SIGSYS), code 1 (SYS_SECCOMP) in tid 6546 (.fileredirect:x), pid 6546 (.fileredirect:x) 2019-05-09 19:06:04.185 1797-11947/? E/WindowManager: win=Window{6b989cf u0 com.sec.android.app.launcher/com.sec.android.app.launcher.activities.LauncherActivity} destroySurfaces: appStopped=false win.mWindowRemovalAllowed=false win.mRemoveOnExit=false win.mViewVisibility=8 caller=com.android.server.wm.WindowManagerService.tryStartExitingAnimation:2752 com.android.server.wm.WindowManagerService.relayoutWindow:2449 com.android.server.wm.Session.relayoutForTranslate:287 android.view.IWindowSession$Stub.onTransact:432 com.android.server.wm.Session.onTransact:186 android.os.Binder.execTransact:739 2019-05-09 19:06:06.831 6566-6566/? A/DEBUG: 2019-05-09 19:06:06.831 6566-6566/? A/DEBUG: Build fingerprint: 'samsung/a70qzc/a70q:9/PPR1.180610.011/A7050ZCU1ASD6:user/release-keys' 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: Revision: '12' 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: ABI: 'arm64' 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: pid: 6546, tid: 6546, name: .fileredirect:x >>> cn.qssq666.fileredirect:x <<< 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: signal 31 (SIGSYS), code 1 (SYS_SECCOMP), fault addr -------- 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: Cause: seccomp prevented call to disallowed arm64 system call 300 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x0 00000000ffffff9c x1 0000007fd2014418 x2 0000007fd20102a8 x3 0000000000000100 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x4 0000000000000000 x5 f81d610211055200 x6 f81d610211055200 x7 0052051102611df8 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x8 000000000000012c x9 0000007fd20100e0 x10 000000000000012c x11 0101010101010101 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x12 0000000000000009 x13 0000000000000003 x14 0000007d68655320 x15 f81d610211055200 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x16 0000007d50d928f0 x17 0000007de9337490 x18 0000000000000000 x19 0000007fd2014418 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x20 0000000000000005 x21 0000000000000001 x22 0000007fd2011328 x23 000000000000002d 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x24 0000007fd201232c x25 0000000000000004 x26 0000007def2715f8 x27 0000007fd201232c 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: x28 0000007fd2012328 x29 0000007fd2010280 2019-05-09 19:06:06.832 6566-6566/? A/DEBUG: sp 0000007fd2010240 lr 0000007d50d52d1c pc 0000007de93374b0 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: backtrace: 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #00 pc 000000000001f4b0 /system/lib64/libc.so (syscall+32) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #01 pc 000000000000cd18 /data/app/cn.qssq666.fileredirect-K8mW5u6caOcgcWJomj8QfA==/lib/arm64/libqssqredirect.so (new_fstatat64+84) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #02 pc 0000000000054e48 /system/lib64/libc.so (offset 0x26000) (realpath+640) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #03 pc 000000000001c8cc /system/lib64/libopenjdk.so (canonicalize+176) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #04 pc 000000000001fc34 /system/lib64/libopenjdk.so (Java_java_io_UnixFileSystem_canonicalize0+88) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #05 pc 0000000000116748 /system/framework/arm64/boot.oat (offset 0x115000) (java.lang.invoke.MethodHandle.invoke [DEDUPED]+152) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #06 pc 0000000000559388 /system/lib64/libart.so (art_quick_invoke_stub+584) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #07 pc 00000000000d02c8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+200) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #08 pc 0000000000280cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #09 pc 000000000027acc8 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+968) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #10 pc 000000000052971c /system/lib64/libart.so (MterpInvokeDirect+296) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #11 pc 000000000054bb14 /system/lib64/libart.so (ExecuteMterpImpl+14484) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #12 pc 00000000000c1802 /system/framework/boot.vdex (java.io.UnixFileSystem.canonicalize+8) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #13 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #14 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #15 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #16 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #17 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #18 pc 00000000000b856a /system/framework/boot.vdex (java.io.File.getCanonicalPath+28) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #19 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #20 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2019-05-09 19:06:06.951 6566-6566/? A/DEBUG: #21 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #22 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #23 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #24 pc 000000000012585a /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/cn.qssq666.fileredirect-K8mW5u6caOcgcWJomj8QfA==/base.apk_6546_6546 (deleted) (cn.qssq666.fileredirect.AppContext.testRedirect+126) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #25 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #26 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #27 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #28 pc 000000000052971c /system/lib64/libart.so (MterpInvokeDirect+296) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #29 pc 000000000054bb14 /system/lib64/libart.so (ExecuteMterpImpl+14484) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #30 pc 00000000001257bc /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/cn.qssq666.fileredirect-K8mW5u6caOcgcWJomj8QfA==/base.apk_6546_6546 (deleted) (cn.qssq666.fileredirect.AppContext.onCreate+20) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #31 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #32 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #33 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #34 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #35 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #36 pc 00000000004eac94 /system/framework/boot-framework.vdex (android.app.Instrumentation.callApplicationOnCreate) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #37 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #38 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #39 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #40 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #41 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #42 pc 00000000004c45c2 /system/framework/boot-framework.vdex (android.app.ActivityThread.handleBindApplication+2270) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #43 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #44 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #45 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #46 pc 000000000052971c /system/lib64/libart.so (MterpInvokeDirect+296) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #47 pc 000000000054bb14 /system/lib64/libart.so (ExecuteMterpImpl+14484) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #48 pc 00000000005e9fc8 /system/framework/boot-framework.vdex (android.app.ActivityThread.access$1200) 2019-05-09 19:06:06.952 6566-6566/? A/DEBUG: #49 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #50 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #51 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #52 pc 00000000005298e0 /system/lib64/libart.so (MterpInvokeStatic+204) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #53 pc 000000000054bb94 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #54 pc 00000000004c113a /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+1574) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #55 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #56 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #57 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #58 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #59 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #60 pc 0000000000c73dde /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #61 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #62 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #63 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #64 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #65 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #66 pc 0000000000c7c9b2 /system/framework/boot-framework.vdex (android.os.Looper.loop+406) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #67 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #68 pc 000000000025a410 /system/lib64/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread, art::CodeItemDataAccessor const&, art::ShadowFrame, art::JValue)+216) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #69 pc 000000000027acac /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+940) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #70 pc 00000000005298e0 /system/lib64/libart.so (MterpInvokeStatic+204) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #71 pc 000000000054bb94 /system/lib64/libart.so (ExecuteMterpImpl+14612) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #72 pc 00000000004c68fc /system/framework/boot-framework.vdex (android.app.ActivityThread.main+220) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #73 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #74 pc 0000000000518c70 /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #75 pc 00000000005624fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2019-05-09 19:06:06.953 6566-6566/? A/DEBUG: #76 pc 000000000055964c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #77 pc 00000000000d02e8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+232) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #78 pc 000000000045ed50 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+104) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #79 pc 00000000004607a4 /system/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jobject, _jobject, unsigned long)+1440) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #80 pc 00000000003efe28 /system/lib64/libart.so (art::Method_invoke(_JNIEnv, _jobject, _jobject, _jobjectArray)+52) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #81 pc 000000000011f7e4 /system/framework/arm64/boot.oat (offset 0x115000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+180) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #82 pc 0000000000559388 /system/lib64/libart.so (art_quick_invoke_stub+584) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #83 pc 00000000000d02c8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+200) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #84 pc 0000000000280cc0 /system/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+344) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #85 pc 000000000027acc8 /system/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+968) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #86 pc 00000000005283dc /system/lib64/libart.so (MterpInvokeVirtual+588) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #87 pc 000000000054ba14 /system/lib64/libart.so (ExecuteMterpImpl+14228) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #88 pc 00000000013e13ea /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #89 pc 000000000025491c /system/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1035353631+488) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #90 pc 0000000000518c70 /system/lib64/libart.so (artQuickToInterpreterBridge+1020) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #91 pc 00000000005624fc /system/lib64/libart.so (art_quick_to_interpreter_bridge+92) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #92 pc 0000000000e15180 /system/framework/arm64/boot-framework.oat (offset 0x41e000) (com.android.internal.os.ZygoteInit.main+2208) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #93 pc 000000000055964c /system/lib64/libart.so (art_quick_invoke_static_stub+604) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #94 pc 00000000000d02e8 /system/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+232) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #95 pc 000000000045ed50 /system/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+104) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #96 pc 000000000045e9b0 /system/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, std::__va_list)+424) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #97 pc 0000000000363698 /system/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID, std::__va_list)+652) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #98 pc 00000000000b8238 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+116) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #99 pc 00000000000bae90 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector const&, bool)+768) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #100 pc 0000000000004c44 /system/bin/app_process64 (main+1832) 2019-05-09 19:06:06.954 6566-6566/? A/DEBUG: #101 pc 00000000000c9e60 /system/lib64/libc.so (offset 0x7e000) (__libc_init+88) 2019-05-09 19:06:07.116 1083-1083/? E//system/bin/tombstoned: Tombstone written to: /data/tombstones/tombstone_03 2019-05-09 19:06:07.128 606-606/? E/audit: type=1701 audit(1557399967.115:3855): auid=4294967295 uid=10235 gid=10235 ses=4294967295 subj=u:r:untrusted_app:s0:c235,c256,c512,c768 pid=6546 comm=".fileredirect:x" exe="/system/bin/app_process64" sig=31 res=1 2019-05-09 19:06:07.172 1797-6015/? E/WindowManager: win=Window{d6c63ae u0 Splash Screen cn.qssq666.fileredirect EXITING} destroySurfaces: appStopped=false win.mWindowRemovalAllowed=true win.mRemoveOnExit=true win.mViewVisibility=0 caller=com.android.server.wm.AppWindowToken.destroySurfaces:888 com.android.server.wm.AppWindowToken.destroySurfaces:869 com.android.server.wm.WindowState.onExitAnimationDone:5453 com.android.server.wm.-$$Lambda$01bPtngJg5AqEoOWfW3rWfV7MH4.accept:2 java.util.ArrayList.forEach:1262 com.android.server.wm.AppWindowToken.onAnimationFinished:2422 com.android.server.wm.AppWindowToken.setVisibility:552 2019-05-09 19:06:13.266 606-606/? E/audit: type=1400 audit(1557399973.255:3856): avc: denied { read } for pid=6214 comm="KernelThread-2" name="version" dev="proc" ino=4026532038 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:proc_version:s0 tclass=file permissive=0 SEPF_SM-A7050_9_0002 audit_filtered 2019-05-09 19:06:13.266 606-606/? E/audit: type=1300 audit(1557399973.255:3856): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=c1d67558 a2=20000 a3=0 items=0 ppid=614 pid=6214 auid=4294967295 uid=10208 gid=10208 euid=10208 suid=10208 fsuid=10208 egid=10208 sgid=10208 fsgid=10208 tty=(none) ses=4294967295 comm="KernelThread-2" exe="/system/bin/app_process32" subj=u:r:untrusted_app_27:s0:c512,c768 key=(null) 2019-05-09 19:06:13.266 606-606/? E/audit: type=1327 audit(1557399973.255:3856): proctitle="com.eg.android.AlipayGphone:push" 2019-05-09 19:06:13.269 606-606/? E/audit: type=1400 audit(1557399973.255:3857): avc: denied { read } for pid=6214 comm="KernelThread-2" name="power_supply" dev="sysfs" ino=34742 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 SEPF_SM-A7050_9_0002 audit_filtered 2019-05-09 19:06:13.270 606-606/? E/audit: type=1300 audit(1557399973.255:3857): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=c1d67560 a2=a4000 a3=0 items=0 ppid=614 pid=6214 auid=4294967295 uid=10208 gid=10208 euid=10208 suid=10208 fsuid=10208 egid=10208 sgid=10208 fsgid=10208 tty=(none) ses=4294967295 comm="KernelThread-2" exe="/system/bin/app_process32" subj=u:r:untrusted_app_27:s0:c512,c768 key=(null) 2019-05-09 19:06:13.270 606-606/? E/audit: type=1327 audit(1557399973.255:3857): proctitle="com.eg.android.AlipayGphone:push" 2019-05-09 19:06:13.270 606-606/? E/audit: type=1400 audit(1557399973.255:3858): avc: denied { read } for pid=6214 comm="KernelThread-2" name="power_supply" dev="sysfs" ino=34742 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=0 SEPF_SM-A7050_9_0002 audit_filtered 2019-05-09 19:06:13.270 606-606/? E/audit: type=1300 audit(1557399973.255:3858): arch=40000028 syscall=322 per=8 success=no exit=-13 a0=ffffff9c a1=c1d67560 a2=a4000 a3=0 items=0 ppid=614 pid=6214 auid=4294967295 uid=10208 gid=10208 euid=10208 suid=10208 fsuid=10208 egid=10208 sgid=10208 fsgid=10208 tty=(none) ses=4294967295 comm="KernelThread-2" exe="/system/bin/app_process32" subj=u:r:untrusted_app_27:s0:c512,c768 key=(null) 2019-05-09 19:06:13.270 606-606/? E/audit: type=1327 audit(1557399973.255:3858): proctitle="com.eg.android.AlipayGphone:push" 2019-05-09 19:06:13.284 6214-6528/? E/libc: Access denied finding property "ro.serialno"